Sciweavers

1580 search results - page 83 / 316
» Non-Interference Through Determinism
Sort
View
CAISE
2009
Springer
14 years 4 months ago
Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems
Introducing enterprise information systems (EIS) is usually associated with high costs. It is therefore crucial to understand those factors that determine or influence these costs...
Bela Mutschler, Manfred Reichert
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
14 years 4 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
ICST
2008
IEEE
14 years 4 months ago
Empirical Software Change Impact Analysis using Singular Value Decomposition
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
Mark Sherriff, Laurie Williams
COMSWARE
2007
IEEE
14 years 4 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
POLICY
2007
Springer
14 years 3 months ago
Data-Purpose Algebra: Modeling Data Usage Policies
Data is often encumbered by restrictions on the ways in which it may be used. These restrictions on usage may be determined by statute, by contract, by custom, or by common decenc...
Chris Hanson, Tim Berners-Lee, Lalana Kagal, Geral...